Rapid7 Vulnerability & Exploit Database

Palo Alto Networks PAN-OS Unauthenticated Remote Code Execution

Back to Search

Palo Alto Networks PAN-OS Unauthenticated Remote Code Execution

Disclosed
04/12/2024
Created
04/19/2024

Description

This module exploits two vulnerabilities in Palo Alto Networks PAN-OS that allow an unauthenticated attacker to create arbitrarily named files and execute shell commands. Configuration requirements are PAN-OS with GlobalProtect Gateway or GlobalProtect Portal enabled and telemetry collection on (default). Affected versions include < 11.1.0-h3, < 11.1.1-h1, < 11.1.2-h3, < 11.0.2-h4, < 11.0.3-h10, < 11.0.4-h1, < 10.2.5-h6, < 10.2.6-h3, < 10.2.8-h3, and < 10.2.9-h1. Payloads may take up to one hour to execute, depending on how often the telemetry service is set to run.

Author(s)

  • remmons-r7
  • sfewer-r7

Platform

Linux,Unix

Architectures

cmd

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/linux/http/panos_telemetry_cmd_exec
msf exploit(panos_telemetry_cmd_exec) > show targets
    ...targets...
msf exploit(panos_telemetry_cmd_exec) > set TARGET < target-id >
msf exploit(panos_telemetry_cmd_exec) > show options
    ...show and set options...
msf exploit(panos_telemetry_cmd_exec) > exploit

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;